必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       143.43.0.0 - 143.43.127.255
CIDR:           143.43.0.0/17
NetName:        GSU-143-43-0
NetHandle:      NET-143-43-0-0-1
Parent:         NET143 (NET-143-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Governors State University (GSU-8)
RegDate:        1990-03-26
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/143.43.0.0


OrgName:        Governors State University
OrgId:          GSU-8
Address:        1 University Parkway
City:           University Park
StateProv:      IL
PostalCode:     60466
Country:        US
RegDate:        
Updated:        2019-06-06
Ref:            https://rdap.arin.net/registry/entity/GSU-8


OrgTechHandle: NUSHK4-ARIN
OrgTechName:   Nush, Keith 
OrgTechPhone:  +1-708-235-2117 
OrgTechEmail:  knush@govst.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/NUSHK4-ARIN

OrgAbuseHandle: PUSTZ-ARIN
OrgAbuseName:   Pustz, Charles 
OrgAbusePhone:  +1-708-235-2107 
OrgAbuseEmail:  cpustz@govst.edu
OrgAbuseRef:    https://rdap.arin.net/registry/entity/PUSTZ-ARIN

OrgTechHandle: PUSTZ-ARIN
OrgTechName:   Pustz, Charles 
OrgTechPhone:  +1-708-235-2107 
OrgTechEmail:  cpustz@govst.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/PUSTZ-ARIN

RTechHandle: NUSHK4-ARIN
RTechName:   Nush, Keith 
RTechPhone:  +1-708-235-2117 
RTechEmail:  knush@govst.edu
RTechRef:    https://rdap.arin.net/registry/entity/NUSHK4-ARIN

RTechHandle: PUSTZ-ARIN
RTechName:   Pustz, Charles 
RTechPhone:  +1-708-235-2107 
RTechEmail:  cpustz@govst.edu
RTechRef:    https://rdap.arin.net/registry/entity/PUSTZ-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 143.43.126.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44252
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;143.43.126.85.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040802 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 09 11:07:16 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 85.126.43.143.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 143.43.126.85.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
137.175.20.152 attack
Unauthorized connection attempt from IP address 137.175.20.152 on Port 445(SMB)
2020-01-06 09:59:32
133.242.79.30 attackspambots
Unauthorized connection attempt detected from IP address 133.242.79.30 to port 2220 [J]
2020-01-06 13:18:51
218.202.234.66 attack
Jan  6 00:36:42 server sshd\[7763\]: Invalid user wqi from 218.202.234.66
Jan  6 00:36:42 server sshd\[7763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.202.234.66 
Jan  6 00:36:43 server sshd\[7763\]: Failed password for invalid user wqi from 218.202.234.66 port 53678 ssh2
Jan  6 00:46:29 server sshd\[10044\]: Invalid user tweety from 218.202.234.66
Jan  6 00:46:29 server sshd\[10044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.202.234.66 
...
2020-01-06 09:49:26
77.40.68.78 attackbotsspam
Bruteforce on smtp
2020-01-06 10:01:04
84.109.248.104 attackbotsspam
SSH Brute Force, server-1 sshd[22890]: Failed password for invalid user qkb from 84.109.248.104 port 58956 ssh2
2020-01-06 09:46:55
220.130.10.13 attackspam
2020-01-06T02:44:47.352731  sshd[7499]: Invalid user znb from 220.130.10.13 port 47116
2020-01-06T02:44:47.366166  sshd[7499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.10.13
2020-01-06T02:44:47.352731  sshd[7499]: Invalid user znb from 220.130.10.13 port 47116
2020-01-06T02:44:49.180421  sshd[7499]: Failed password for invalid user znb from 220.130.10.13 port 47116 ssh2
2020-01-06T02:47:56.545302  sshd[7604]: Invalid user node from 220.130.10.13 port 49746
...
2020-01-06 09:48:17
189.180.171.6 attack
Unauthorized connection attempt detected from IP address 189.180.171.6 to port 5555 [J]
2020-01-06 13:00:43
118.179.149.10 attackspambots
Unauthorized connection attempt detected from IP address 118.179.149.10 to port 8080 [J]
2020-01-06 13:21:24
124.156.50.249 attackspambots
Unauthorized connection attempt detected from IP address 124.156.50.249 to port 8880 [J]
2020-01-06 13:19:30
118.89.153.229 attackspam
Unauthorized connection attempt detected from IP address 118.89.153.229 to port 2220 [J]
2020-01-06 13:21:56
122.165.187.114 attackspam
Unauthorized connection attempt detected from IP address 122.165.187.114 to port 2220 [J]
2020-01-06 13:20:16
177.106.182.172 attackbots
Unauthorized connection attempt detected from IP address 177.106.182.172 to port 22 [J]
2020-01-06 13:01:28
104.187.149.195 bots
Jangan
2020-01-06 13:12:40
186.68.38.42 attackbots
Unauthorized connection attempt detected from IP address 186.68.38.42 to port 8080 [J]
2020-01-06 13:13:20
177.222.144.72 attack
Unauthorized connection attempt detected from IP address 177.222.144.72 to port 23 [J]
2020-01-06 13:16:03

最近上报的IP列表

161.192.39.209 2606:4700:10::6814:6170 121.230.89.148 2606:4700:10::6816:3382
2606:4700:10::ac43:1871 110.78.158.145 2606:4700:10::6814:7953 2606:4700:10::6814:4704
121.230.89.66 2606:4700:10::6816:288 245.110.253.73 149.90.87.141
183.36.35.205 178.104.79.68 54.197.196.44 6.113.106.237
212.135.43.222 17.241.75.21 17.241.219.166 119.249.100.42